Cyber Posture

CVE-2026-7584

High

Published: 01 May 2026

Published
01 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0004 12.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7584 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Zhinst Labone Q. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 12.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring validation of serialized inputs to reject arbitrary class names and constructor arguments during deserialization.

prevent

Mandates identification, reporting, and correction of the insecure deserialization flaw to prevent arbitrary code execution.

prevent

Verifies integrity of experiment files and software components prior to deserialization, blocking tampered data that exploits the class-loading mechanism.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
T1059.006 Python Execution
Adversaries may abuse Python commands and scripts for execution.
Why these techniques?

The insecure deserialization in import_cls allows arbitrary Python class loading and code execution from a crafted serialized file, directly enabling T1204.002 (victim loads malicious file) and T1059.006 (Python interpreter execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target…

more

class or restriction on which modules could be imported. An attacker can craft a serialized experiment file that causes the deserialization engine to import and instantiate arbitrary Python classes with attacker-controlled constructor arguments, resulting in arbitrary code execution in the context of the user running the Python process. Exploitation requires the victim to load a malicious file using LabOne Q's deserialization functions, for example a compromised experiment file shared for collaboration or support purposes.

Deeper analysisAI

CVE-2026-7584 affects the LabOne Q serialization framework's class-loading mechanism, specifically the import_cls function, which dynamically imports and instantiates Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from serialized data without validation of the target class or restrictions on importable modules, enabling insecure deserialization.

An attacker can exploit this vulnerability by crafting a malicious serialized experiment file. Exploitation requires a victim to load the file using LabOne Q's deserialization functions, such as a compromised experiment file shared for collaboration or support purposes. Successful exploitation leads to arbitrary code execution in the context of the user running the Python process. The CVSS v3.1 base score is 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), with no privileges required but local access and user interaction needed.

The vendor's security advisory provides details on mitigation, available at https://www.zhinst.com/support/security/2026/zi-sa-2026-002/.

Details

CWE(s)

Affected Products

zhinst
labone q
26.4.0 · 2.41.0 — 26.1.2

CVEs Like This One

CVE-2026-22612Shared CWE-502
CVE-2026-24165Shared CWE-502
CVE-2026-24150Shared CWE-502
CVE-2026-24152Shared CWE-502
CVE-2026-26208Shared CWE-502
CVE-2025-70560Shared CWE-502
CVE-2026-22608Shared CWE-502
CVE-2026-22607Shared CWE-502
CVE-2025-21364Shared CWE-502
CVE-2025-62373Shared CWE-502

References